Build Opportunity Scout

v0.1.0

Analyze harvested trend data and generate prioritized build opportunities for new skills/apps (P0/P1/P2) with implementation hints. Use when user wants actio...

0· 85·0 current·0 all-time
bycaptainlee@meilihulee
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description match the actual behavior. The script reads /root/.openclaw/workspace/data/harvest/feature_patterns.json and produces prioritized opportunities. No unrelated capabilities (cloud creds, network access, or unusual binaries) are requested.
Instruction Scope
SKILL.md directs running the included python script and specifies the exact input and outputs. The script only reads the declared input path, computes simple heuristics, and writes the listed output files — no extra file reads, no environment-var access, and no external network calls.
Install Mechanism
There is no install spec (instruction-only with an included script). Nothing is downloaded or extracted; no external packages are installed.
Credentials
The skill requires no environment variables, credentials, or config paths beyond the single workspace input file. Requested resources are proportionate to the task.
Persistence & Privilege
No 'always: true' or other elevated persistence is requested. The skill does not modify other skills or system-wide settings and only writes its own output files in the workspace.
Assessment
This skill appears to do what it claims: inspect the included scout.py to confirm you're comfortable running it, ensure the input file (/root/.openclaw/workspace/data/harvest/feature_patterns.json) does not contain sensitive data, and be aware the script will overwrite or create the two output files in the workspace. If you want extra caution, run the script in a sandboxed environment or inspect the input data first; no network traffic or secret access was found in the code.

Like a lobster shell, security has layers — review code before you run it.

latestvk97c1s1y1kr500dkkk48dsgvdn83b9z5

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments